Privacy Compliance and Security SLA: CSA addressing the challenges

Size: px
Start display at page:

Download "Privacy Compliance and Security SLA: CSA addressing the challenges"

Transcription

1 Privacy Compliance and Security SLA: CSA addressing the challenges Daniele Catteddu, Managing Director EMEA & OCF-STAR Program Director - Cloud Security Alliance Arthur van der Wees, Managing Director international law firm Arthur s Legal Dr. Paolo Balboni, Chair - CSA Privacy Level Agreement Working Group; Founding Partner - ICT LEGAL CONSULTING; Scientific Director - European Privacy Association Cloud Security Alliance, 2014.

2 ABOUT THE CLOUD SECURITY ALLIANCE To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing. Global, not-for-profit organization Over 65,000 individual members, more than 200 corporate members, and 65 chapters Building best practices and a trusted cloud ecosystem Agile philosophy, rapid development of applied research GRC: Balance compliance with risk management Reference models: build using existing standards Identity: a key foundation of a functioning cloud economy Champion interoperability Enable innovation Advocacy of prudent public policy Cloud Security Alliance, 2014.

3 ABOUT THE CLOUD SECURITY ALLIANCE To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing. RESEARCH ADVISE GOVERNMENTS AND PRIVATE COMPANIES EDUCATION PROFESSIONAL CERTIFICATION TRAINING PROVIDER CERTIFICATION STANDARDS Events Cloud Security Alliance, 2014.

4 Cloud Procurement Barriers

5 PICSE: Cloud service procurement The overarching objective of PICSE is to set up a European Procurers Platform capable of raising the level of understanding of the issues surrounding procurement of cloud services PICSE stakeholders Procurement specialists Public Research Organisations Funding agencies, national research agencies & councils SMEs & private sector Policy Makers Cloud Service Providers Associations of local government & procurers Public sector Decision Makers General Public About PICSE H2020 Coordination and Support Action Total budget: 500 K Duration: 18 months Start date: 1 Oct Partners: 03/12/2014 InfoSecurity,

6 Cloud Procurement: needs and requirements 03/12/2014 InfoSecurity,

7 Cloud Procurement: Challenges 03/12/2014 InfoSecurity,

8 Cloud Procurement: Barriers 03/12/2014 InfoSecurity,

9 Cloud Procurement: What to improve? 03/12/2014 InfoSecurity,

10 Cloud SLA

11 Cloud SLAs, SLA Life Cycle & SLA Ready Arthur van der Wees, Managing Director international law firm Arthur s Legal InfoSecurity, 2015

12 Massive Productivity Growth Necessary: technology is key Financial Times (26 May 2015)

13 Risks, Comfort, Trust in & Rewards of the Cloud Cloud Services Challenges: For the 80% not yet using cloud services, insufficient knowledge is the main blocking factors (42%). For the 20% using cloud services, the risk of a security breach is the main limiting factor (39%). Eurostat (EC) Cybersecurity & Data Protection: Threat or Strength? Microsoft Azure (ISO 27018) 13

14 Cloud Banking Europe (April 2015)

15 Cloud Computing, SLAs & European Commission European Commission Priority: Digital Single Market C-SIG Drafting Group DG CNECT: Select expert group (CSA, IBM, Microsoft, Telecom Italia and Arthur s Legal): EC Cloud SLA Standardisation Guidelines, ISO and other standardisation. SLA Ready: This 2015/2016 project and its consortium partners help out contributing to a common understanding as well as more standardisation and transparency of cloud SLAs, so companies can make an informed decision what to use and what to expect and

16

17 MISSION SLA READY Making Cloud SLAs readily usable in the private sector Increase the uptake of cloud computing by making it easier for SMEs to understand SLAs Improve transparency in SLAs for SaaS & IaaS Increase the amount of standardised terms and metrics in SLAs Bridge the disconnect between supply and demand through common vocabularies Provide user-friendly decision making tools and services Helping out companies to make an informed decision about what cloud services to use, and what to expect and trust. Contributing to common understanding, more standardization and transparency.

18 EC Cloud SLA Standardisation Guidelines: 4 Main categories Service Level Objectives (SLOs): Performance Security Data Management Personal Data Protection SLA Life Cycle: Assess, Select, SLA, Execute, Monitor, Update & Terminate Data Life Cycle: Create/derive, Store, Use/Process, Share, Archive, Destroy

19 Cloud Service Level Ecosystem #Cloud #Trust #Strategy #Performance #Security #Data #Data Protection #SLAReady SLAs are an important but yet only one particle in the Cloud Service Level Ecosystem:

20 Cloud Service Level Ecosystem Technology Human Standardisation & Certification (Self-regulatory) Cloud SLA & Other Contractual Arrangements Risk Allocation & Insurance Law & Legislation Case Law Ethics & Accountability

21 EC Security Service Objectives Chapter 4 EC SLA Standardisation Guidelines 4.1. Service Reliability 4.2. Authentication & Authorization 4.3. Cryptography 4.4. Security Incident management and reporting 4.5. Logging and Monitoring 4.6. Auditing and security verification 4.7. Vulnerability Management 4.8. Governance Service changes Human Factor Technology Cloud SLA & Other agreements Risk Allocation & Insurance Standardisation & Certification Law, Legislation & Case law Ethics & Accountability

22

23 Cloud SLA Legal Life Cycle When zooming in at one (1) SLA from a legal, negotiation and contract management perspective, the life cycle of a SLA can be split in seven (7) headline legal life cycle phases: 1. Assessment 2. Preparation 3. Negotiation & Contracting 4. Execution & Operation 5. Updates & Amendments 6. Escalation, and; 7. Termination & Consequences of Termination

24 State of Practice vs State of Art Current maturity level of Cloud SLAs of CSPs: 1. Difficult to find, difficult to read & assess: Lot s of push-back at CSPs 2. Performance: Availability, Uptime & Measurements 3. Incident Management: Response time per prioritised incident 4. Carve-outs & other exclusions: Planned Maintenance, Force Majeure, customer, third parties 5. Less than 10% coverage out of the EC SLA Standardisation Guidelines 6. Difficult to monitor, manage & enforce: status.aws.amazon.com (real-time system status & status history (35 days)), trust.salesforce.com (real-time system status & planned maintenance), (real-time system status & status history (up to 1 year))

25 Qualitative vs quantitative Service Levels? It is a Service! For a customer/user it may be quite different from traditional IT & utilities. Customer is king? Quality of Living, Mercer: Vienna (1), Zurich (2), Amsterdam (11), London (40) Measuring 36 metrics: Security, International connectivity, Public logistics, Quality of architecture and design, Tolerance, Mobility, Business conditions, Pro-active developments, Environmental responsibility, Medical and other care. Experience Level Agreement (xla): it s a feeling! Experience, Perception & Feel versus Facts, Standards & (Post-)commodity Building block thinking, multi-flavoured, new USPs, upsell potential #SLA per vertical #SLA per use #SLA for a day # Build your SLA

26 PRIVACY LEVEL AGREEMENT Cloud Security Alliance, 2014.

27 EU Privacy Compliance CSA PRIVACY LEVEL AGREEMENT and EC CODE of CONDUCT

28 EC C-SIG Privacy Code of Conduct Cloud Security Alliance, 2014.

29 EU Cloud Strategy

30 Privacy CoC: Purpose and Scope The Code is a voluntary instrument, allowing a CSP to evaluate and demonstrate its adherence to the Code s requirements. The purpose of this Code is to instil trust and confidence among cloud customers that: the personal data to be processed under the CSP Service Agreement (the customer s personal data) are processed with an appropriate level of data protection; an adhering CSP has met the applicable requirements as set out in this Code related to the processing of personal data, in accordance with the EU Data Protection Directive and its national transpositions. The Code applies mainly to Data Processors

31 Conditions of adherence (i) self-evaluation and self-declaration of compliance, or (ii) by relying on third-party certification. Any CSP may sign up to the Code, irrespective of where personal data is stored and processed. CSPs that have demonstrated their adherence to the Code in accordance with its governance processes may use the Code s relevant compliance marks.

32 Data Protection Requirements Contractual specification of the terms and conditions of the CSP s services Processing Personal Data lawfully Transfer of the customer s personal data within the CSP s Group Transfer of the customer s personal data to a subcontractor Right to audit Liability Cooperation with the customer Data Subject complaint handling Data Protection Authority request handling Confidentiality obligations Law enforcement/governmental requests Data breach Termination of the Services Agreement

33 Security Requirements Availability Integrity Confidentiality Transparency Isolation Accountability

34 Status CoC was sent to Art29 WP on January 2015 for their review and potential endorsement Final (?) feedback expected very soon

35 PRIVACY LEVEL AGREEMENT Cloud Security Alliance, 2014.

36 Privacy Level Agreement - PLA V2 EU Compliance Tool

37 CSA Privacy Level Agreement (PLA [V1]) Goal: Encourage uniform, consistent and streamlined practices for CSPs in handling personal data Facilitate complete and more relevant disclosures Scope & methodology Follows EU Data Protection Directive 95/46/EC principles and EU Commission Proposal for General Data Protection Regulation Addresses WP29 Opinion 5/2012 on Cloud Computing European Data Protection Authorities guidelines on cloud contracts and use of cloud computing services

38 DPA s opinions on PLA?

39 CSA Privacy Level Agreement (PLA [V2]) - EU compliance tool!!!!!!!!!!!! Privacy(Level(Agreement(Working(Group! Privacy!Level!Agreement![V2]:! A!Compliance!Tool!for!Providing!Cloud!! Services!in!the!European!Union! The! PLA([V2]! has! been! developed! within! CSA! by! an! expert! Working! Group! composed! of! representatives! of! Cloud! Service! Providers,!local!Data!Protection!Authorities!and!independent!security!and!privacy!professionals;!co(chaired!by!Dr.!Paolo!Balboni! and!francoise!gilbert,!with!the!technical!supervision!of!daniele!catteddu.!! The!PLA!working!group!is!sponsored!by!!!!! May!2015! CLOUD SECURITY ALLIANCE PLA Working Group - PLA [V2]: A Compliance Tool for Providing Cloud Services in the European Union! Copyright 2015 Cloud Security Alliance. All rights reserved.!! Goal: Provide CSPs a tool to achieve EU-wide data protection compliance Provide cloud customer with a tool to evaluate CSP EU-wide data protection compliance Scope & Methodology Deals with the B2B scenario Follows EU current Data Protection Law Strongly based on WP29 Opinion 5/2012 on Cloud Computing, written in the light of ISO/IEC 27018, the Cloud Service Level Agreement Standardisation Guidelines, the work developed by the Cloud Select Industry Group on Code of Conduct, & the Cloud Accountability Project Considers differences between CSPcontroller and CSP-processor

40 Privacy Level Agreement V2 1. Identity of the CSP (and of representative in the EU as applicable), its role, and the contact information for the data protection inquiries 1. Ways in which the data will be processed - Personal data location - Subcontractors - Installation of software on cloud customer s system

41 Privacy Level Agreement V2 3. Data transfer identify on which legal ground: e.g., EU Commission adequacy decision, model contracts, Safe Harbor, Binding Corporate Rules (BCR) 4. Data security measures - Availability - Integrity - Confidentiality - Transparency - Isolation (purpose limitation) - Intervenability

42 Privacy Level Agreement V2 5. Monitoring 6. Personal Data breach notification 7. Data portability, migration, and transfer back assistance back

43 Privacy Level Agreement V2 8. Data retention, restitution, and deletion Data retention policy / Data retention for compliance with legal requirements Data restitution or deletion 9. Accountability 10. Cooperation 9. Legally required disclosure

44 PLA V2 Table (Annex 1)

45 NEXT STEP PLA [V3] global version

46 CLOUD CONTROL MATRIX (CCM) CONSENSUS ASSESSMENTS INITIATIVE QUESTIONNAIRE (CAIQ) Cloud Security Alliance, 2014.

47 WHAT IS THE CCM? First ever baseline control framework specifically designed for Cloud supply chain risk management: Delineates control ownership (Provider, Customer) An anchor for security and compliance posture measurement Provides a framework of 16 control domains Controls map to global regulations and security standards Industry Driven Effort: 120+ Peer Review Participants Participants: AICPA, Microsoft, McKesson, ISACA, Oracle Backbone of the Open Certification Framework and STAR Cloud Security Alliance, 2014.

48 CCM V CONTROL AREAS Cloud Security Alliance, 2014.

49 CCM v3.0.1 Current Version: Released July 10, 2014 Builds upon the 5 new domains introduced in v3.0 Mobile Security Supply Chain Management Transparency & Accountability; Interoperability & Portability Encryption & Key Management Continued improvements in controls including: Language and auditability Reduction of overlapping controls Removed Customer and Provider references within the language Cloud Security Alliance, 2014.

50 CCM v3.0.1 New and Updated Mappings including: AICPA 2014 TSC ISO/IEC PCI DSS v3.0 NIST SP R3 App J ENISA IAF 95/46/EC - European Union Data Protection Directive HIPAA / HITECH Act COBIT 5.0 Canada PIPEDA COPPA ODCA UM: PA R2.0 Cloud Security Alliance, 2014.

51 CAIQ v3.0.1 Current Version: Released July 10, 2014 Companion to CSA CCM v3.0.1 and aligned to CSA s Guidance Questions mapped to the compliance requirements in CCM v3.0.1 Helps organizations build assessment processes for cloud providers Helps cloud providers assess their own security posture Improved cohesion between CCM and CAIQ in v3.0.1 Questions updated to facilitate STAR measurement Cloud Security Alliance, 2014.

52 ALIGNMENT CCM & CAIQ Controls now directly referenced Numbering & questions linked to control Cloud Security Alliance, 2014.

53 FUTURE OF CCM Continue to improve controls: Auditability & Measurement Clarity Intent Revisit the development cycle Evaluate additional candidates for mapping Cloud Security Alliance, 2014.

54 OPEN CERTIFICATION FRAMEWORK (OCF) / STAR Program Cloud Security Alliance, 2014.

55 CERTIFICATION CHALLENGES Provide a globally relevant certification to reduce duplication of efforts Address localized, national-state and regional compliance needs Address industry specific requirements Address different assurance requirements Address certification staleness assure provider is still secure after point in time certification Do all of the above while recognizing the dynamic and fastchanging world that is cloud Cloud Security Alliance, 2014.

56 DEBATING AROUND CERTIFICATION FOR CLOUD The debate around cloud certification has been based on the following key aspects: Suitability of existing security certification/attestation schemes (e.g. ISO or SSAE16/SOC1-2-3) for the cloud market vs. the needs to introduce new schemes Mandatory vs. voluntary industry driven approaches Global vs. Regional/National schemes Cost Transparency Assurance and maturity/capability models Cloud Security Alliance, 2014.

57 CSA STAR: SECURITY, TRUST & ASSURANCE REGISTRY Launched in 2011, the CSA STAR is the first step in improving transparency and assurance in the cloud. Searchable registry to allow cloud customers to review the security practices of providers, accelerating their due diligence and leading to higher quality procurement experiences. Cloud Security Alliance, The STAR is a publicly accessible registry that documents the security controls provided by cloud computing offerings Helps users to assess the security of cloud providers It is based on a multilayered structure defined by Open Certification Framework Working Group

58 OPEN CERTIFICATION FRAMEWORK The CSA Open Certification Framework is an industry initiative to allow global, accredited, trusted certification of cloud providers. Cloud Security Alliance, 2014.

59 Certificates CSA STAR CERTIFICATION & ISO WHY CSA STAR Certification builds on ISO27001? Help organizations prioritize areas for improvement and lead them towards business excellence. ISO is the international standard for information security Considered as Gold Standard for information security There are over 20,000 organisations certified globally in over 120 countries. 20,000 15,000 10,000 5, Cloud Security Alliance, 2014.

60 ISO CRITICISMS ISO is updated every 8 years the controls become obsolete faster than that It is a one size fits all standard but there are some industry specific concerns it does not cover, ie it is not Cloud relevant Any standard can become a lowest common denominator People can certify any scope they like within their organisation to mislead clients It doesn't support transparency Cloud Security Alliance, 2014.

61 WHAT IS CSA STAR CERTIFICATION? The CSA STAR Certification is a rigorous third-party independent assessment of the security of a cloud service provider. Technology-neutral certification leverages the requirements of the ISO/IEC 27001:2013 & the CSA CCM Integrates ISO/IEC 27001:2013 with the CSA CCM as additional or compensating controls. Measures the capability levels of the cloud service. Evaluates the efficiency of an organization s ISMS and ensures the scope, processes and objectives are Fit for Purpose. Based upon the Plan, Do, Check, Act (PDCA) approach Enables the auditor to assess a company s performance, on long-term sustainability and risks, in addition to ensuring they are SLA driven. Cloud Security Alliance, 2014.

62 HOW DO YOU GET THERE? OPTIMIZATION MODEL The organization has an ad hoc and inconsistent approach to this privacy standard or practice. The organization has a consistent overall approach, but it is mostly undocumented. The organization has a documented, detailed approach, but no routine measurement or enforcement of it. Process is characterize d as a quantitative ly managed process. A quantitative ly managed process is a defined (capability level 3) process that is controlled using statistical and other quantitative Process that is improved based on an understandin g of the common causes of variation inherent in the process. No Approach Reactive Proactive techniques. Improving Innovating Cloud Security Alliance, 2014.

63 HOW TO TAKE THE JOURNEY No Approach Reactive Proactive Improving Innovating The organization has an ad hoc and inconsistent approach to this privacy standard or practice. The organization has a consistent overall approach, but it is mostly undocumented. The organization has a documented, detailed approach, but no routine measurement or enforcement of it. Process is characterize d as a quantitative ly managed process. A quantitative ly managed process is a defined (capability level 3) process that is controlled using statistical and other quantitative techniques. Process that is improved based on an understandin g of the common causes of variation inherent in the process. Cloud Security Alliance, 2014.

64 MANAGEMENT CAPABILITY / MATURITY: SCORES When an Organization is audited a Management Capability Score will be assigned to each of the control areas in the CCM. This will indicate the capability of the management in this area to ensure the control is operating effectively. The management capability of the controls will be scored on a scale of These scores have been divided into 5 different categories that describe the type of approach characteristic of each group of scores. Cloud Security Alliance, 2014.

65 APPROVING ASSESSORS They must demonstrate knowledge of the Cloud Sector Either through verifiable industry experience this can include though assessing organizations Or through completing CCSK certification or equivalent They must be a qualified auditor working a ISO accredited CB Evidence of conducting ISO assessments for a certification body accredited by an IAF member to ISO or their qualifications as an auditor for that organization. They must complete the CSA approved course qualifying them to audit the CCM for STAR Certification Cloud Security Alliance, 2014.

66 ACCREDITED CERTIFICATION BODIES Cloud Security Alliance, 2014.

67 WHO IS USING CSA STAR? Currently 135 Cloud Service Providers Word Wide have decided to be part of the STAR Program! That includes companies with either STAR Self Assessment (102) or STAR Certification (30) or STAR Attestation (3) Several other in the process of completing their auditing processes Cloud Security Alliance, 2014.

68 How about Governments & EU Institutions? Are they requesting CSA Cloud Security Alliance, 2014.

69 EC and EU Parliament The Directorate-General for Informatics (DIGIT) in a tender that aims to secure about 2500 VM & 2500 Terabytes of storage for a number of EU Institutions (75% of the volume will be reserved for the European Parliament, Council and other EU) requests the candidate tenders to make use of the CSA STAR program to show compliance with security requirements established by the European Security Agency (ENISA). Please check out Annex 2 Security Requirements. Cloud Security Alliance, 2014.

70 EC and EU Parliament The EC is just the last (and surely not the least) that recognises the values of our certification and assurance program, prior to them other Governments (e.g. UK, Spain, Taiwan, Singapore, Canada, etc.) has made direct reference to STAR and CCM. Cloud Security Alliance, 2014.

71 UK G-Cloud example Cloud Security Alliance, 2014.

72 OPEN CERTIFICATION FRAMEWORK The CSA Open Certification Framework is an industry initiative to allow global, accredited, trusted certification of cloud providers. Cloud Security Alliance, 2014.

73 OCF Level 3 CSA STAR Continuous will be based on a continuous auditing/assessment of relevant security properties. It will built on the following CSA best practices/standards: Cloud Control Matrix (CCM) Cloud Trust Protocol (CTP) CloudAudit (A6) CSA STAR Continuous is currently under development and the target date of delivery is Cloud Security Alliance, 2014.

74 ??? Cloud Security Alliance, 2015.

75 THANK YOU! CONTACT US Daniele Catteddu; Managing Director EMEA, Cloud Security r/ Cloud Security Alliance, 2015.

76 CONTACT US Please check: @SLAReady

77 Dr. Paolo Balboni, CONTACT US Chair - CSA Privacy Level Agreement Working Group; Founding Partner - ICT LEGAL CONSULTING; Scientific Director - European Privacy Association InfoSecurity Europe 2015 Olympia, United Kingdom 4 June 2015 Cloud Security Alliance, 2014.

The Cloud Security Alliance

The Cloud Security Alliance The Cloud Security Alliance Daniele Catteddu, Managing Director EMEA & OCF-STAR Program Director Cloud Security Alliance ABOUT THE CLOUD SECURITY ALLIANCE To promote the use of best practices for providing

More information

TOOLS and BEST PRACTICES

TOOLS and BEST PRACTICES TOOLS and BEST PRACTICES Daniele Catteddu Managing Director EMEA, Cloud Security Alliance ABOUT THE CLOUD SECURITY ALLIANCE To promote the use of best practices for providing security assurance within

More information

Cloud Channel Summit 2015 @rhipecloud #RCCS15

Cloud Channel Summit 2015 @rhipecloud #RCCS15 Cloud Channel Summit 2015 @rhipecloud #RCCS15 About the Cloud Security Alliance Global, not-for-profit organisation 300 member driven organization with over 56,000 individual members in 65 chapters worldwide

More information

Open Certification Framework. Vision Statement

Open Certification Framework. Vision Statement Open Certification Framework Vision Statement Jim Reavis and Daniele Catteddu August 2012 BACKGROUND The Cloud Security Alliance has identified gaps within the IT ecosystem that are inhibiting market adoption

More information

Cloud computing and personal data protection. Gwendal LE GRAND Director of technology and innovation CNIL

Cloud computing and personal data protection. Gwendal LE GRAND Director of technology and innovation CNIL Cloud computing and personal data protection Gwendal LE GRAND Director of technology and innovation CNIL 1 Data protection in Europe Directive 95/46/EC Loi 78-17 du 6 janvier 1978 amended in 2004 (France)

More information

Building an Effective

Building an Effective Building an Effective Cloud Security Program Becky Swain Co-Founder/Chair, CSA CCM Board Member, CSA Silicon Valley Chapter Partner, EKKO Consulting Marlin Pohlman Co-Chair, CSA CCM Co-Chair/Founder, CSA

More information

A view from the Cloud Security Alliance peephole

A view from the Cloud Security Alliance peephole A view from the Cloud Security Alliance peephole Cloud One million new mobile devices - each day! Social Networking Digital Natives State Sponsored Cyberattacks? Organized Crime? Legal Jurisdiction & Data

More information

Information Security ISO Standards. Feb 11, 2015. Glen Bruce Director, Enterprise Risk Security & Privacy

Information Security ISO Standards. Feb 11, 2015. Glen Bruce Director, Enterprise Risk Security & Privacy Information Security ISO Standards Feb 11, 2015 Glen Bruce Director, Enterprise Risk Security & Privacy Agenda 1. Introduction Information security risks and requirements 2. Information Security Management

More information

GRC Stack Research Sponsorship

GRC Stack Research Sponsorship GRC Stack Research Sponsorship Overview Achieving Governance, Risk Management and Compliance (GRC) goals requires appropriate assessment criteria, relevant control objectives and timely access to necessary

More information

A Flexible and Comprehensive Approach to a Cloud Compliance Program

A Flexible and Comprehensive Approach to a Cloud Compliance Program A Flexible and Comprehensive Approach to a Cloud Compliance Program Stuart Aston Microsoft UK Session ID: SPO-201 Session Classification: General Interest Compliance in the cloud Transparency Responsibility

More information

Cloud Security Certification

Cloud Security Certification Cloud Security Certification January 21, 2015 1 Agenda 1. What problem are we solving? 2. Definitions (Attestation vs Certification) 3. Cloud Security Responsibilities and Risk Exposure 4. Who is responsible

More information

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter Cloud Security considerations for business adoption Ricci IEONG CSA-HK&M Chapter What is Cloud Computing? Slide 2 What is Cloud Computing? My Cloud @ Internet Pogoplug What is Cloud Computing? Compute

More information

Cloud Security Benchmark: Top 10 Cloud Service Providers Appendix A E January 5, 2015

Cloud Security Benchmark: Top 10 Cloud Service Providers Appendix A E January 5, 2015 Cloud Security Benchmark: Top 10 Cloud Service Providers Appendix A E January 5, 2015 2015 CloudeAssurance Page 1 Table of Contents Copyright and Disclaimer... 3 Appendix A: Introduction... 4 Appendix

More information

Privacy Level Agreement Outline for the Sale of Cloud Services in the European Union

Privacy Level Agreement Outline for the Sale of Cloud Services in the European Union Privacy Level Agreement Working Group Privacy Level Agreement Outline for the Sale of Cloud Services in the European Union February 2013 The PLA Outline has been developed within CSA by an expert working

More information

Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32

Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32 Security, Compliance & Risk Management for Cloud Relationships Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32 Introductions & Poll Organization is leveraging the Cloud? Organization

More information

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is

More information

Wrapping Audit Arms around the Cloud Georgia 2013 Conference for College and University Auditors

Wrapping Audit Arms around the Cloud Georgia 2013 Conference for College and University Auditors 1 Wrapping Audit Arms around the Cloud Georgia 2013 Conference for College and University Auditors Scott Woodison Executive Director, Compliance and Enterprise Risk Office of Internal Audit and Compliance

More information

Deploying Cloud Security Standards The MTCS Experience

Deploying Cloud Security Standards The MTCS Experience Deploying Cloud Security Standards The MTCS Experience Presented to ASEAN CSA Summit 2015 Tao Yao Sing Assistant Director, National Cloud Computing Office 12 June 2015 Background Cloud security is always

More information

ENISA and Cloud Security

ENISA and Cloud Security ENISA and Cloud Security Rossen Naydenov Network Information Security Officer Critical Information Infrastructure Protection Department - ENISA European Union Agency for Network and Information Security

More information

How to ensure control and security when moving to SaaS/cloud applications

How to ensure control and security when moving to SaaS/cloud applications How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk

More information

Global Efforts to Secure Cloud Computing. Jason Witty President, Cloud Security Alliance Chicago

Global Efforts to Secure Cloud Computing. Jason Witty President, Cloud Security Alliance Chicago Global Efforts to Secure Cloud Computing Jason Witty President, Cloud Security Alliance Chicago Cloud: Ushering in IT Spring Technology consumerization and its offspring Cloud: Compute as a utility Smart

More information

Helix Nebula: Secure Brokering of Cloud Resources for escience. Dr. Jesus Luna Garcia

Helix Nebula: Secure Brokering of Cloud Resources for escience. Dr. Jesus Luna Garcia Helix Nebula: Secure Brokering of Cloud Resources for escience Dr. Jesus Luna Garcia Outline Background The Blue-Box architecture Security Goals and Requirements Let s imagine Why a Public-Private Partnership

More information

Cloud certification guidelines and recommendations

Cloud certification guidelines and recommendations Cloud certification guidelines and recommendations www.cloudwatchhub.eu [email protected] Security and privacy certifications and attestations have been identified as one of most effective and efficient

More information

Assessing Risks in the Cloud

Assessing Risks in the Cloud Assessing Risks in the Cloud Jim Reavis Executive Director Cloud Security Alliance Agenda Definitions of Cloud & Cloud Usage Key Cloud Risks About CSA CSA Guidance approach to Addressing Risks Research

More information

Cloud Security Alliance: Industry Efforts to Secure Cloud Computing

Cloud Security Alliance: Industry Efforts to Secure Cloud Computing Cloud Security Alliance: Industry Efforts to Secure Cloud Computing Jim Reavis, Executive Director September, 2010 Cloud: Dawn of a New Age Art Coviello - the most overhyped, underestimated phenomenon

More information

CLOUD COMPUTING Contractual and data protection aspects

CLOUD COMPUTING Contractual and data protection aspects CLOUD COMPUTING Contractual and data protection aspects Cloudscape VI 25 February 2014, Bruxelles Paolo Balboni Ph.D., Founding Partner, ICT Legal Consulting Domenico Converso LL.M., Senior Associate,

More information

Article 29 Working Party Issues Opinion on Cloud Computing

Article 29 Working Party Issues Opinion on Cloud Computing Client Alert Global Regulatory Enforcement If you have questions or would like additional information on the material covered in this Alert, please contact one of the authors: Cynthia O Donoghue Partner,

More information

The role of certification and standards for trusted Cloud solutions

The role of certification and standards for trusted Cloud solutions The role of certification and standards for trusted Cloud solutions A CloudWATCH webinar 2014 Cloud Security Alliance - All Rights Reserved. Agenda 15:00 Welcome and Introduction 10 15:10 The role of

More information

Selecting a Cloud Service Provider (CSP)

Selecting a Cloud Service Provider (CSP) Selecting a Cloud Service Provider (CSP) Steven C. Markey, MSIS, PMP, CISSP, CIPP, CISM, CISA, STS-EV, CCSK, CompTIA Cloud Essentials Principal, ncontrol, LLC Adjunct Professor President, Cloud Security

More information

Cloud Standardization, Compliance and Certification. Class 2012 event 25.rd of October 2012 Dalibor Baskovc, CEO Zavod e-oblak

Cloud Standardization, Compliance and Certification. Class 2012 event 25.rd of October 2012 Dalibor Baskovc, CEO Zavod e-oblak Cloud Standardization, Compliance and Certification Class 2012 event 25.rd of October 2012 Dalibor Baskovc, CEO Zavod e-oblak Todays Agenda IT Resourcing with Cloud Computing and related challenges Landscape

More information

D4.1 Cloud certification guidelines and recommendations

D4.1 Cloud certification guidelines and recommendations Ref. Ares(2015)444655-04/02/2015 www.cloudwatchhub.eu D4.1 Cloud certification guidelines and recommendations Revised Version www.cloudwatchhub.eu [email protected] @CloudWatchHub Security and privacy

More information

Acquia Comments on EU Recommendations for Data Processing in the Cloud

Acquia Comments on EU Recommendations for Data Processing in the Cloud Acquia Comments on EU Recommendations for Data Processing in the Cloud Executive Summary On July 1, 2012, European Union (EU) data protection regulators provided guidelines for service providers processing

More information

PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By:

PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By: PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By: Peter Spier Managing Director PCI and Risk Assurance Fortrex Technologies Agenda Instructor Biography Background On

More information

Service Measurement Index Framework Version 2.1

Service Measurement Index Framework Version 2.1 Service Measurement Index Framework Version 2.1 July 2014 CSMIC Carnegie Mellon University Silicon Valley Moffett Field, CA USA Introducing the Service Measurement Index (SMI) The Service Measurement Index

More information

Summary of responses to the public consultation on Cloud computing run by CNIL from October to December 2011 and analysis by CNIL

Summary of responses to the public consultation on Cloud computing run by CNIL from October to December 2011 and analysis by CNIL Summary of responses to the public consultation on Cloud computing run by CNIL from October to December 2011 and analysis by CNIL 1. Definition of Cloud Computing In the public consultation, CNIL defined

More information

Daniel Field, Atos Spain. Towards the European Open Science Cloud, Heidelberg, 20/01/2016

Daniel Field, Atos Spain. Towards the European Open Science Cloud, Heidelberg, 20/01/2016 Daniel Field, Atos Spain Towards the European Open Science Cloud, Heidelberg, 20/01/2016 SLALOM is ready to use Cloud SLAs SLALOM will take theory to practice, providing a trusted verifiable starting point

More information

PRIVACY CHECKLIST FOR CLOUD SERVICE CONTRACTS

PRIVACY CHECKLIST FOR CLOUD SERVICE CONTRACTS PRIVACY CHECKLIST FOR CLOUD SERVICE CONTRACTS CIRRUS WORSHOP 28 February 2013, The Interna

More information

Cloud Audit and Cloud Trust Protocol. By David Lingenfelter 2011

Cloud Audit and Cloud Trust Protocol. By David Lingenfelter 2011 Cloud Audit and Cloud Trust Protocol By David Lingenfelter 2011 Background > MaaS360 SaaS Cloud Model > Mobile Device Management > FISMA Moderate Certified > SAS-70/SOC-2 Cloud Adoption Obstacles Planning

More information

Robert Brammer. Senior Advisor to the Internet2 CEO [email protected]. Internet2 NET+ Security Assessment Forum. 8 April 2014

Robert Brammer. Senior Advisor to the Internet2 CEO rfbtech@internet2.edu. Internet2 NET+ Security Assessment Forum. 8 April 2014 Robert Brammer Senior Advisor to the Internet2 CEO [email protected] Internet2 NET+ Security Assessment Forum 8 April 2014 INTERNET2 NET+ Security Initiative Primary objective -- develop guidance to

More information

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014 IT Cloud / Data Security Vendor Risk Management Associated with Data Security September 9, 2014 Speakers Brian Thomas, CISA, CISSP In charge of Weaver s IT Advisory Services, broad focus on IT risk, security

More information

The problem of cloud data governance

The problem of cloud data governance The problem of cloud data governance Vasilis Tountopoulos, Athens Technology Center S.A. (ATC) CSP EU Forum 2014 - Thursday, 22 nd May, 2014 Focus on data protection in the cloud Why data governance in

More information

Cloud Security Standards. Aziza Al Rashdi Director, Cyber Security Professional Services Oman National CERT Information Technology Authority

Cloud Security Standards. Aziza Al Rashdi Director, Cyber Security Professional Services Oman National CERT Information Technology Authority Cloud Security Standards Aziza Al Rashdi Director, Cyber Security Professional Services Oman National CERT Information Technology Authority Introduction Sign Off December 2012 Information Technology Authority

More information

Cloud Service Level Agreement Standardisation Guidelines

Cloud Service Level Agreement Standardisation Guidelines Cloud Service Level Agreement Standardisation Guidelines Brussels 24/06/2014 1 Table of Contents Preamble... 4 1. Principles for the development of Service Level Agreement Standards for Cloud Computing...

More information

Orchestrating the New Paradigm Cloud Assurance

Orchestrating the New Paradigm Cloud Assurance Orchestrating the New Paradigm Cloud Assurance Amsterdam 17 January 2012 John Hermans - Partner Current business challenges versus traditional IT Organizations are challenged with: Traditional IT seems

More information

Understanding ISO 27018 and Preparing for the Modern Era of Cloud Security

Understanding ISO 27018 and Preparing for the Modern Era of Cloud Security Understanding ISO 27018 and Preparing for the Modern Era of Cloud Security Presented by Microsoft and Foley Hoag LLP s Privacy and Data Security Practice Group May 14, 2015 Proposal or event name (optional)

More information

ARTICLE 29 DATA PROTECTION WORKING PARTY

ARTICLE 29 DATA PROTECTION WORKING PARTY ARTICLE 29 DATA PROTECTION WORKING PARTY 2588/15/EN WP 232 Opinion 02/2015 on C-SIG Code of Conduct on Cloud Computing Adopted on 22 September 2015 This Working Party was set up under Article 29 of Directive

More information

Security and Privacy in Cloud Computing

Security and Privacy in Cloud Computing Security and Privacy in Cloud Computing - Study Report Sai Lakshmi General Manager Enterprise Security Solutions 2 Agenda Background & Objective Current Scenario & Future of Cloud Computing Challenges

More information

Cloud Security Introduction and Overview

Cloud Security Introduction and Overview Introduction and Overview Klaus Gribi Senior Security Consultant [email protected] May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious

More information

Need to reassure customers that your cloud services are secure? Inspire confidence with STAR Certification from BSI

Need to reassure customers that your cloud services are secure? Inspire confidence with STAR Certification from BSI Need to reassure customers that your cloud services are secure? Inspire confidence with STAR Certification from BSI What is STAR Certification? TM STAR Certification differentiates you from your competition.

More information

Cloud Security Trust Cisco to Protect Your Data

Cloud Security Trust Cisco to Protect Your Data Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive

More information

FINRA Publishes its 2015 Report on Cybersecurity Practices

FINRA Publishes its 2015 Report on Cybersecurity Practices Securities Litigation & Enforcement Client Service Group and Data Privacy & Security Team To: Our Clients and Friends February 12, 2015 FINRA Publishes its 2015 Report on Cybersecurity Practices On February

More information

Microsoft s Compliance Framework for Online Services

Microsoft s Compliance Framework for Online Services Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft

More information

Information Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza

Information Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza Information Security Management System (ISMS) Overview Arhnel Klyde S. Terroza May 12, 2015 1 Arhnel Klyde S. Terroza CPA, CISA, CISM, CRISC, ISO 27001 Provisional Auditor Internal Auditor at Clarien Bank

More information

ENISA and Cloud Security

ENISA and Cloud Security ENISA and Cloud Security Dimitra Liveri NIS Expert EuroCloud Forum 2015 Barcelona 07-10-2015 European Union Agency for Network and Information Security Securing Europe s Information Society Operational

More information

Information Security Management System for Microsoft s Cloud Infrastructure

Information Security Management System for Microsoft s Cloud Infrastructure Information Security Management System for Microsoft s Cloud Infrastructure Online Services Security and Compliance Executive summary Contents Executive summary 1 Information Security Management System

More information

Need to reassure customers that your cloud services are secure? Inspire confidence with STAR Certification from BSI

Need to reassure customers that your cloud services are secure? Inspire confidence with STAR Certification from BSI Need to reassure customers that your cloud services are secure? Inspire confidence with STAR Certification from BSI What is STAR Certification? TM STAR Certification is a unique new certification which

More information

Security in the Cloud

Security in the Cloud Security in the Cloud Visibility & Control of your Cloud Service Provider Murray Goldschmidt, Pierre Tagle, Ph.D. April 2012 Compliance, Protection & Business Confidence Sense of Security Pty Ltd Sydney

More information

08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview

08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview Data protection and compliance In the cloud and in your data center 1 November 2013 Agenda 1 Introduction 2 Data protection overview 3 Understanding the cloud 4 Where do I start? 5 Wrap-up Page 2 Data

More information

HIPAA and HITRUST - FAQ

HIPAA and HITRUST - FAQ A COALFIRE WHITE PAPER HIPAA and HITRUST - FAQ by Andrew Hicks, MBA, CISA, CCM, CRISC, HITRUST CSF Practitioner Director, Healthcare Practice Lead Coalfire February 2013 Introduction Organizations are

More information

Office 365 Data Processing Agreement with Model Clauses

Office 365 Data Processing Agreement with Model Clauses Enrollment for Education Solutions Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Enrollment for Education Solutions number Microsoft to complete 7392924 GOLDS03081

More information

Protecting Data and Privacy in the Cloud

Protecting Data and Privacy in the Cloud Protecting Data and Privacy in the Cloud Contents 1 3 6 9 12 13 Protecting Data and Privacy in the Cloud an Introduction Building Services to Protect Data Protecting Data in Service Operations Empowering

More information

Recommendations for companies planning to use Cloud computing services

Recommendations for companies planning to use Cloud computing services Recommendations for companies planning to use Cloud computing services From a legal standpoint, CNIL finds that Cloud computing raises a number of difficulties with regard to compliance with the legislation

More information

Role of contracts in Cloud Computing an Overview. Kevin McGillivray Doctoral Candidate (NRCCL)

Role of contracts in Cloud Computing an Overview. Kevin McGillivray Doctoral Candidate (NRCCL) Role of contracts in Cloud Computing an Overview Kevin McGillivray Doctoral Candidate (NRCCL) Barriers/Challenges to Cloud Transparency Compliance Legal Shared infrastructure Subcontractors (and their

More information

Ensuring Cloud Security Using Cloud Control Matrix

Ensuring Cloud Security Using Cloud Control Matrix International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 9 (2013), pp. 933-938 International Research Publications House http://www. irphouse.com /ijict.htm Ensuring

More information

Data Risk Management: ISM Ground to Cloud Summit. accelerate your ambition 1

Data Risk Management: ISM Ground to Cloud Summit. accelerate your ambition 1 Data Risk Management: ISM Ground to Cloud Summit accelerate your ambition 1 John Jones Branch Practice Manager Networking, Communications & Security Solutions [email protected] Justin Evans

More information

Cloud Computing Governance & Security. Security Risks in the Cloud

Cloud Computing Governance & Security. Security Risks in the Cloud Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud

More information

Cloud Service Contracts: An Issue of Trust

Cloud Service Contracts: An Issue of Trust Cloud Service Contracts: An Issue of Trust Marie Demoulin Assistant Professor Université de Montréal École de Bibliothéconomie et des Sciences de l Information (EBSI) itrust 2d International Symposium,

More information

Protec'ng Data and Privacy in a World of Clouds and Third Par'es Vincent Campitelli

Protec'ng Data and Privacy in a World of Clouds and Third Par'es Vincent Campitelli Protec'ng Data and Privacy in a World of Clouds and Third Par'es Vincent Campitelli Vice President, IT Risk Management McKesson Corpora-on What is Your Business Model? Economic Moats In business, I look

More information

Consolidated Audit Program (CAP) A multi-compliance approach

Consolidated Audit Program (CAP) A multi-compliance approach Consolidated Audit Program (CAP) A multi-compliance approach ISSA CONFERENCE Carlos Pelaez, Director, Coalfire May 14, 2015 About Coalfire We help our clients recognize and control cybersecurity risk,

More information

A Guide to the Cyber Essentials Scheme

A Guide to the Cyber Essentials Scheme A Guide to the Cyber Essentials Scheme Published by: CREST Tel: 0845 686-5542 Email: [email protected] Web: http://www.crest-approved.org/ Principal Author Jane Frankland, Managing Director, Jane

More information

IAPP Privacy Certification

IAPP Privacy Certification IAPP Privacy Certification Program Introduction to the Certification Foundation copyright 2011, IAPP Overview Each candidate who seeks an IAPP privacy certification for the very first time must complete

More information

European Cloud Computing. Strategy. Cloud standards. Ken Ducatel DG CONNECT

European Cloud Computing. Strategy. Cloud standards. Ken Ducatel DG CONNECT European Cloud Computing Cloud standards Strategy Ken Ducatel DG CONNECT The Cloud Computing Strategy The European Commission's strategy 'Unleashing the potential of cloud computing in Europe' Adopted

More information

3 rd Party Vendor Risk Management

3 rd Party Vendor Risk Management 3 rd Party Vendor Risk Management Session 402 Tuesday, June 9, 2015 (11 to 12pm) Session Objectives The need for enhanced reporting on vendor risk management Current outsourcing environment Key risks faced

More information

Compliance and the Cloud: What You Can and What You Can t Outsource

Compliance and the Cloud: What You Can and What You Can t Outsource Compliance and the Cloud: What You Can and What You Can t Outsource Presented By: Kate Donofrio Security Assessor Fortrex Technologies Instructor Biography Background On Fortrex What s In A Cloud? Pick

More information

AN OVERVIEW OF INFORMATION SECURITY STANDARDS

AN OVERVIEW OF INFORMATION SECURITY STANDARDS AN OVERVIEW OF INFORMATION SECURITY STANDARDS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced

More information

The Information Security Management System According ISO 27.001 The Value for Services

The Information Security Management System According ISO 27.001 The Value for Services I T S e r v i c e M a n a g e m e n t W h i t e P a p e r The Information Security Management System According ISO 27.001 The Value for Services Author: Julio José Ballesteros Garcia Introduction Evolution

More information

Cloud Security Strategies. Fabio Gianotti, Head of Cyber Security and Enterprise Security Systems

Cloud Security Strategies. Fabio Gianotti, Head of Cyber Security and Enterprise Security Systems Cloud Security Strategies Fabio Gianotti, Head of Cyber Security and Enterprise Security Systems London, 14 October 2015 UNICREDIT AT A GLANCE Employees: more than 146.600 Branches: 8.403 Banking operations

More information

Procurement Innovation for Cloud Services in Europe - PICSE

Procurement Innovation for Cloud Services in Europe - PICSE Procurement Innovation for Cloud Services in Europe - PICSE Sara Garavelli, Trust-IT Services [email protected] ICT Proposer s Day, 9 October 2014, Florence, Italy 1 The road to PICSE Cloud

More information

Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization

Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization Outside View of Increased Regulatory Requirements Regulatory compliance is often seen as sand in the gears requirements

More information

Security in the Cloud: Visibility & Control of your Cloud Service Providers

Security in the Cloud: Visibility & Control of your Cloud Service Providers Whitepaper: Security in the Cloud Security in the Cloud: Visibility & Control of your Cloud Service Providers Date: 11 Apr 2012 Doc Ref: SOS-WP-CSP-0412A Author: Pierre Tagle Ph.D., Prashant Haldankar,

More information